How to use Tools in Kaspersky Security Cloud
Tools in Kaspersky Security Cloud are designed to optimize your computer. You can use them to configure your browser, clear traces of user activity on the computer, troubleshoot the operating system after infection, and delete data permanently.
How to configure your browser
The Browser Configuration Wizard analyzes the settings of Microsoft Internet Explorer for security issues. For example, the Wizard checks whether the latest browser updates are installed and looks for any vulnerabilities that could be used to damage your PC.
To run the Browser Configuration Wizard:
- In the main window of Kaspersky Security Cloud, click More Tools.
- If you have problems opening the application, see this guide.
- Click Show 6 more.
- Select Browser Configuration.
- In the Browser Configuration window, click Next.
- Wait for the scan to complete.
- Select the checkboxes besides the issues that need to be fixed, then click Next.
- Click Done.
What to do if running the Wizard caused issues using the the Internet
If you have experienced issues using the Internet after running the Browser Configuration Wizard, you can roll back the changes that were made. To do so:
- Start the Browser Configuration Wizard .
- In the Browser Configuration window, select Roll back changes and click Next.
- In the list of changes, select the checkboxes beside the actions you would like to roll back and click Next.
- Wait until the changes have been rolled back successfully and click Done.
- Make sure that you can now use the Internet as normal.
If the issue persists, submit a request to Kaspersky Customer Service by choosing the topic of your request.
How to delete traces of user activity
When you use the Internet or standard desktop applications, files are saved in the system with the following information about your activity:
- Browsing history
- Search queries
- Information about started applications and edited files
- Microsoft Windows system log entries
- Temporary files
These files may contain confidential information, such as passwords, so you should delete them regularly.
To remove user activity logs:
- In the main window of Kaspersky Security Cloud, click More Tools.
- If you have problems opening the application, see this guide.
- Click Show 6 more.
- Select Privacy Cleaner.
- In the Privacy Cleaner window, select:
- Search for user activity traces.
- Roll back changes (this option is only available if you have previously used the Privacy Cleaner Wizard to delete user activity traces).
- Click Next.
- Wait until the search is completed.
- Select the checkboxes beside the actions you wish the Wizard to take and click Next.
- Wait until the traces have been removed successfully.
- Click Done.
If you run the Privacy CleanerWizard once again, it may detect activity traces that you have already deleted. Information about user activity is constantly accumulating in the system. For example, a Microsoft Windows log file may be being used by the system when the Wizard tries to removes it. To remove this file, the Wizard will prompt you to reboot the system. The file may be created again while rebooting, in which case the Wizard will detect it once more the next time you run a search.
How to delete data permanently
Before selling your PC, we recommended deleting all personal data, such as photographs. Deleting data with the standard Microsoft Windows tools (sending them to Recycle Bin and then emptying it) does not fully prevent the data from being restored in future. Any data recovery application will be able to restore files deleted in this way. Formatting partitions also does not guarantee that cybercriminals will not be able to restore your data. Kaspersky Security Cloud deletes data by overwriting a file’s contents with a random set of symbols. This prevents the files from being restored using standard data recovery tools.
File Shredder can delete data from local drives (if the user has permission to write and delete information) and from removable drives. It can also remove data from other devices that are recognized as removable drives (USB-drives, flash cards, floppy disks, mobile devices). Deleting data from a removable drive is only possible if write protection is disabled.
To delete data:
- In the main window of Kaspersky Security Cloud, click More Tools.
- If you have problems opening the application, see this guide.
- Click Show 6 more.
- Select File Shredder.
- In the Delete data permanently window, specify the path to the object you want to delete. You can type the path manually, or locate the object by clicking Browse.
- In the Data deletion method section, select an option from the list:
- Quick delete (recommended).
- GOST R 50739-95, Russian Federation.
- VSITR standard, Germany.
- Bruce Schneier algorithm.
- NAVSO P-5239-26 (MFM) standard, USA
- NAVSO P-5239-26 (RLL) standard, USA
- DoD 5250.22-М standard, USA.
-
To delete date from SSD or USB devices and network drives, we recommend selecting Quick delete or GOST R 50739-95, Russia. The other methods might damage the device or network drive.
- Click Delete.
- If the Wizard detects system files and folders amongst the data you selected, it will prompt you for additional confirmation before deleting them.
- Confirm the data removal by clicking Delete.
- Wait until the files have been deleted.
Which methods are used to delete data
To prevent your personal data from being restored after you have deleted it, use File Shredder in Kaspersky Security Cloud. Streams of numbers are written in the place where the deleted file was previously located. Kaspersky Security Cloud uses standardized algorithms for writing the number chains (methods). The methods differ in sequence and number of overwriting passes. The methods that use more than three data overwrites are considered the most secure. File Shredder in Kaspersky Security Cloud uses the following methods:
- Quick delete (recommended) : Data is deleted using two data overwriting passes: the first writes zeros, and the second pseudo-random numbers. The main advantage of this algorithm is its speed. Two passes are enough to block most data recovery applications. Even if the file itself is later restored, any data it contained will have been deleted permanently.
- GOST R 50739-95, Russia : The algorithm carries out one overwriting pass using pseudo-random numbers and protects the data against being restored using standard tools. This algorithm corresponds to protection class 2 out of 6, according to the State Technical Commission classification.
- VSITR standard , Germany . The algorithm carries out seven overwriting passes. It is considered reliable but takes longer to run.
- Bruce Schneier Algorithm . The process consists of seven overwriting passes. The method differs from VSITR by its overwriting sequence. This enhanced method of data deletion is considered the most reliable.
- NAVSO P-5239-26 (MFM) standard, USA , and NAVSO P-5239-26 (RLL) standard, USA . This algorithm carries out three overwriting passes. The standards differ from one another in their overwriting sequences.
- DoD 5250.22-М standard, USA . The algorithm carries out three overwriting passes. It is considered a reliable method of protection against people who are able to restore your data without using special tools.
How to troubleshoot your PC after an infection or a system error
After a malware infection, traces of malicious objects are left in the system. For example, the operating system security settings might be incorrect, file extensions might have been changed, access to the Control Panel might be blocked, etc. Troubleshooting after an infection removes any malicious files or damage left behind by malware, as well the consequences of any system errors and malfunctioning optimization software.
To run the Microsoft Windows Troubleshooting Wizard after an infection:
- In the main window of Kaspersky Security Cloud, click More Tools.
- If you have problems opening the application, see this guide.
- Click Show 6 more.
- Select Microsoft Windows Troubleshooting.
- In the Microsoft Windows Troubleshooting window, select an action:
- Search for damage caused by malware activity
- Roll back changes Roll back changes : This option restores the system to the state it was in before the Microsoft Windows Troubleshooting Wizard made any changes. This option is only available if the Wizard has made changes previously.
- To start, click Next.
- Wait for the search to complete.
- Select the checkboxes besides the damage you want the Wizard to fix, and click Next.
- Wait for the troubleshooting to complete and click Done.